General

  • Target

    db1ac06bbbed41e3635ee7069aad5082b7ced8dbe1f09547a0f5f0d345656de0

  • Size

    11.7MB

  • Sample

    221203-pc4dgacg9s

  • MD5

    22d5f986c00539600b0d97116cbbb92e

  • SHA1

    7715ceaf145571fa569ccee00e7f7144433dd625

  • SHA256

    db1ac06bbbed41e3635ee7069aad5082b7ced8dbe1f09547a0f5f0d345656de0

  • SHA512

    7b58ffa39e8596d31179c6d782d6e5b8897eef6651217b7d2ecf3245d8c68940eeedbdbc47a2abb91752260672b4dba7be69a907f71ff093ab909a39a24e09d0

  • SSDEEP

    49152:rUb6aWB0hM0GxAD/oZU8G7Ce4TNY/MvyqOY3q2V0rE:rUGaWBCf40gpG7C1NLvllv3

Score
6/10

Malware Config

Targets

    • Target

      db1ac06bbbed41e3635ee7069aad5082b7ced8dbe1f09547a0f5f0d345656de0

    • Size

      11.7MB

    • MD5

      22d5f986c00539600b0d97116cbbb92e

    • SHA1

      7715ceaf145571fa569ccee00e7f7144433dd625

    • SHA256

      db1ac06bbbed41e3635ee7069aad5082b7ced8dbe1f09547a0f5f0d345656de0

    • SHA512

      7b58ffa39e8596d31179c6d782d6e5b8897eef6651217b7d2ecf3245d8c68940eeedbdbc47a2abb91752260672b4dba7be69a907f71ff093ab909a39a24e09d0

    • SSDEEP

      49152:rUb6aWB0hM0GxAD/oZU8G7Ce4TNY/MvyqOY3q2V0rE:rUGaWBCf40gpG7C1NLvllv3

    Score
    6/10
    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks